CN107623554A - A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network - Google Patents
A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network Download PDFInfo
- Publication number
- CN107623554A CN107623554A CN201710735383.0A CN201710735383A CN107623554A CN 107623554 A CN107623554 A CN 107623554A CN 201710735383 A CN201710735383 A CN 201710735383A CN 107623554 A CN107623554 A CN 107623554A
- Authority
- CN
- China
- Prior art keywords
- fusion center
- user
- secondary user
- frequency spectrum
- trust value
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention belongs to wireless device, network communication technology field, discloses a kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network, and key step includes:Each secondary user's and fusion center perceive ambient parameter in network;Fusion center calculates average signal-to-noise ratio, false-alarm probability, path loss, detection probability, bit average signal-to-noise ratio, a bit error probability, reports correct sensing results probability;Select trust value thresholding and time window;Secondary user's report sensing results;Calculate secondary user's trust value;Trust value judges;Judge the number of elements difference that the number of elements for participating in the secondary user's set of frequency spectrum perception is gathered with honest user;Frequency spectrum perception result judgement is carried out, obtains court verdict.The present invention can detect the various attacks that malicious user starts in the case of non-ideal CCCH, and have good robustness when attacker's quantity is more, ensure that the accuracy of frequency spectrum perception data.
Description
Technical field
The invention belongs to wireless device, network communication technology field, more particularly to a kind of collaboration frequency spectrum based on trust value
Cognitive method, cognition wireless network.
Background technology
The large-scale application of wireless device and wireless network makes limited frequency spectrum resource growing tension, and static spectral distributes
There is the problem of frequency spectrum resource utilization rate is low in scheme, the proposition of cognitive radio technology is exactly to alleviate frequency spectrum resource utilization rate
Contradiction between low and frequency spectrum resource is short.Cognition wireless network allows unauthorized user to find to be not used by frequency spectrum perception
Idle grants frequency spectrum, wait for an opportunity frequency spectrum access to improve the utilization rate of frequency spectrum resource.Frequency spectrum perception is that unauthorized user enters
Line frequency spectrum accesses a critical step, and perception data is reported fusion center by unauthorized user, and fusion center is to channel perception
No occupancy makes final judgement.In order to solve unique user due to perceiving knot caused by the reasons such as multipath fading and concealed terminal
Fruit inaccuracy problem, collaborative spectrum sensing have obtained extensive research.Perception is improved by the collaborative sensing of multiple users
The degree of accuracy, but can introduce the attacker of malice in collaborative spectrum sensing process.Current most of researchs use faith mechanism, lead to
The credit value of more new node is crossed to reject malicious user, but most Research Hypothesis unauthorized user reports sense to fusion center
The CCCH of primary data be it is preferable, i.e., will not be because of the shadow of noise, barrier etc. in perception data transmitting procedure
Ring and malfunction.The hypothesis of this preferable CCCH has certain reasonability, but in the environment of practical application, due to prominent
Send out noise and build the influence of species barrier, the perception information error-prone of transmission;If not considering error issues, will make
Obtain the degree of accuracy of fusion center judgement and the verification and measurement ratio of malicious user is influenceed by serious.Therefore, deposited in CCCH
In the case of mistake, how to ensure that the robustness of attacker's detection scheme and the degree of accuracy of fusion center judgement are a urgent needs
Solve the problems, such as.For center type cognition wireless network during collaborative spectrum sensing, the secondary user's of each unauthorized will be local
Frequency spectrum perception result fusion center is reported by CCCH, fusion center is by integration program to each secondary user's
Perception data is merged, and obtains final court verdict to determine to authorize whether frequency range takes;In cognition wireless network except
Resource utilization problem, security are the premises of its network operation.Safety problem can directly affect the standard of frequency spectrum perception
Exactness, during frequency spectrum perception, frequency spectrum perception data tampering attack (SSDF:Spectrum Sensing Data
Falsification) it is one of attack form for having a great influence at present.A kind of Zhejiang University's patented technology " cognitive radio system
Cooperation frequency spectrum sensing method in system " (application number:200810163516.2 Authorization Notice No.:CN 101459445B) disclosed in
A kind of frequency spectrum sensing method cooperated in cognitive radio system.The patented technology comprises the concrete steps that:It is each use first
Family carries out energy measuring to primary user's signal, and energy measuring sensing results are sent into control centre;From User reliability data
The confidence level of each user is read in storehouse, is normalized to obtain weight system of each user in this cooperative sensing
Number;Local sensing results are mutually multiplied accumulating afterwards compared with the decision threshold of system with the weight coefficient of corresponding user, if greater than
Then target frequency bands are currently being used by primary user;Used if less than then target frequency bands currently without by primary user.The patent
Technology can detect the attacker of malice to a certain extent, reduce influence of the malicious user to system, but existing deficiency
It is:First, during frequency spectrum perception result is sent to control centre by perception user, not accounting for perception data can be public
The problem of being made a mistake during control channel transmission, and in the physical environment of reality, wireless signal is in transmission
During, reason is blocked etc. due to burst noise, the interference of other wireless signals and barrier, it is easy to make a mistake;Secondly,
Final judging result is together decided on by perception data and weight, and this just produces attacker when sending malicious data, due to number
According to difference it is entirely possible cause whole court verdict mistake the problem of.Hyder C S et al. are in its paper " ARC:Adaptive
reputation based clustering against spectrum sensing data falsification
attacks”([J].《IEEE Transactions on mobile computing》,2014,13(8):In 1707-1719)
Propose it is a kind of malicious user is detected based on the clustering algorithm of credit value, the algorithm does not need the priori of attacker's distribution
Attack detecting is can be carried out, SSDF some attacks can be resisted to a certain extent.Deficiency is existing for this method:It is first
First, the algorithm is not accounted for because secondary user's by CCCH report perception number during credit value updates
According to when may mistake situation, " 0 " that local primary user is not present especially is obtained using the method for hard decision in secondary user's
" 1 " court verdict existing for primary user, and " 0 ", " 1 " court verdict are sent to fusion center by public control channel
During, because environment burst noise, barrier such as block at the interference of factor, it is likely that so that " 0 ", " 1 " result are sent out completely
Raw reversion, this will increase the probability of false detection and false-alarm probability of system, more in the scene of non-ideal control channel to its algorithm
In the case of the individual non-conspiracy attack of attacker, after attacker's quantity exceedes the 30% of system user sum, probability of false detection reaches
To 0.2 or so, false-alarm probability reaches 0.15 or so, and this will have a strong impact on the accuracy of perception data judgement;Secondly, for attacking
The problem of attack pattern for the person of hitting does not account for conspiracy attack, the algorithm proposed to it are non-ideal public in attacker's conspiracy attack
In the case of control channel, after attacker's quantity exceedes the 30% of system user sum.Its correct judgement probability only has 0.6 left side
The right side, and correctly adjudicate probability with the increase of attacker's quantity and start drastically to decline.Court verdict mistake is so may result in,
The normal frequency range of resultant interference primary user uses or wasted available frequency spectrum resource.
In summary, the problem of prior art is present be:Existing frequency spectrum sensing method, which exists, does not account for perception data
The problem of being made a mistake during CCCH transmits, data difference is entirely possible to cause whole court verdict
The problem of mistake;Do not account for due to when secondary user's report perception data by CCCH may mistake feelings
Condition, increase the probability of false detection and false-alarm probability of system, have a strong impact on the accuracy of perception data judgement, cause court verdict
Mistake.
The content of the invention
The problem of existing for prior art, the invention provides a kind of cooperative frequency spectrum sensing method based on trust value,
Cognition wireless network.
The present invention is achieved in that a kind of cooperative frequency spectrum sensing method based on trust value, described based on trust value
Cooperative frequency spectrum sensing method includes:After network startup, each secondary user's and fusion center perceive ambient parameter in network, to system
Required each parameter is initialized;Fusion center calculate average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability,
Bit average signal-to-noise ratio, a bit error probability, report the probability of correct sensing results;Fusion center determines that time window is big
It is small, select trust value thresholding;Fusion center seclected time window and trust thresholding;Secondary user's report frequency spectrum sense to fusion center
Know result;Calculate the trust value of each secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding;
Judge the difference for the number of elements that the quantity for participating in the element of the secondary user's set of collaborative spectrum sensing is gathered with honest user;
Fusion center carries out frequency spectrum perception result judgement, obtains final court verdict.
Further, the cooperative frequency spectrum sensing method based on trust value comprises the following steps:
Step 1, each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU
Transmission power ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary use
Family SUiThe distance between fusion center di, path loss constant κ, path loss index μ, energy measuring thresholding λ and Gauss make an uproar
The variances sigma of sound2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;Fusion center calculates flat
Equal signal to noise ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd:Fusion center is respectively under preferable CCCH
Secondary user's SUiReceive the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUi
Between path loss hPUWith detection probability PdCalculated;Fusion center calculates path loss hi, bit average signal-to-noise ratioWith
One bit error probability Pe,i:Fusion center is respectively to fusion center under non-ideal CCCH and secondary user's SUiIt
Between path loss hi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit error probability Pe,iEnter
Row calculates;Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i:Fusion center is respectively to preferable common control channel
Secondary user's under road report correct perception probability pHCorrect perception is reported with the secondary user's under non-ideal CCCH
Probability PH,iEstimated;
Step 2, fusion center determine to calculate the time window T of secondary user's trust valuew;Fusion center is respectively each
Secondary user's SUi(i=1,2 ..., N), select trust value thresholding ηi;
Step 3, seclected time window TwWith trust thresholding ηi, initialize honest user's setSecondary user's are every
Individual time window TwDuring beginning by Energy-aware method obtain perceive frequency range data, and by by the perception data of itself with
Energy threshold λ compares carry out hard decision, obtains judgement " 0 ", " 1 " result of itself, and reports fusion center, and " 0 " represents to perceive
Frequency range is idle, and " 1 " represents that perceive frequency range just uses in authorized user;In each time window TwAt the end of, used for secondary
FamilyFusion center calculates its trust value ri;Fusion center is by each secondary user's SUiTrust value riWith trusting door
Limit ηiIt is compared, if ri< ηi, then user SU is perceivediFor malicious attacker, and update honest user's set"/" represents that user SU will be perceivediGather from honest userMiddle rejecting;Judge to participate in cooperation
The secondary user's set of frequency spectrum perceptionElement quantityGather with honest userNumber of elementsDifference
Value:If fusion center judgesSet up, then carry out in next step, otherwise network operator terminates the network operation, and
Each cognitive nodes are investigated, wherein Δ represents difference threshold;Fusion center is in next time window TwAccording to secondary
The sensing results of reporting of user carry out data fusion with the credit value of the user with most methods of weighting, obtain final result S.
Further, fusion center calculates average signal-to-noise ratioFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween
Path loss hPUWith detection probability PdMethod be:
Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions.
Further, fusion center calculates path loss hi, bit average signal-to-noise ratioWith a bit error probability Pe,i's
Method is:
Further, fusion center estimation reports the Probability p of correct sensing resultsHAnd PH,iMethod be:
pH=PBPd+PI(1-Pf);
Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not being authorized
The probability of band transmissions signal, PI=1-PB;
Further, fusion center determines time window TwThe method of size is:
Further, fusion center selection trust value thresholding ηiRefer to ηiMeet:
Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
Further, fusion center calculates each secondary user's SUiTrust value riMethod be:
Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result and fusion center conclusive judgement
Consistent number.
Further, fusion center carries out frequency spectrum perception result judgement, and obtaining final result S method is:
Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, are merged
The court verdict at center is " 1 ", i.e., channel perception takes;Otherwise court verdict is " 0 ", and channel perception is idle.
Another object of the present invention is to provide a kind of recognizing for the cooperative frequency spectrum sensing method based on trust value described in application
Know wireless network.
Advantages of the present invention and good effect are:According to the position where each users at different levels, and combine channel fading feelings
Condition, trust value is independently distributed for each user, overcome the deficiency that global user initializes same trust value.Can be non-ideal
CCCH attacker quantity carried out less than the total number of users half of system in the case of conspiracy attack with close to 1.0
Detection probability detects attacker, and previously mentioned Hyder C S et al. detection scheme in this case detect to attack
The probability for the person of hitting only has 0.6 or so, the effective accuracy for ensureing fusion center final judging result, avoids the wave of available frequency band
Take, prevent the interference to authorized master user proper communication.The present invention can under the scene of non-ideal CCCH basis
The trust value of secondary user's judges whether it is malicious user, rejects the perception data of mistake, makes cognition wireless network frequency spectrum sense
The data known are more accurately and reliably.
The present invention is during secondary user's report perception data to fusion center, it is contemplated that data are in transmission
Error problem, overcome and assume that control CCCH is ideal communication channel in the prior art, do not consider in actual data transfer
During error problem;And in terms of malicious attacker challenge model, it is contemplated that multiple in practical application scene attack
The Hybrid Attack of the non-conspiracy attack of the person of hitting, conspiracy attack and conspiracy and non-conspiracy, can be attacked in non-ideal CCCH
In the case that person starts various attack patterns, the mistaken verdict probability of system is reduced to 0.02 or so, and it is previously mentioned
The mistaken verdict probability of Hyder C S et al. scheme in this case is overcome in the prior art to public 0.1 or so
The preferable deficiency with the single hypothesis of attacker's attack pattern of control channel so that the present invention improves practicality.
Brief description of the drawings
Fig. 1 is the cooperative frequency spectrum sensing method flow chart provided in an embodiment of the present invention based on trust value.
Fig. 2 is the application scenarios schematic diagram of the cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention
It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to
Limit the present invention.
The present invention can detect the various attacks that malicious user starts in the case of nonideal CCCH, and
And there is good robustness when attacker's quantity is more, it ensure that the accuracy of frequency spectrum perception data.
The application principle of the present invention is explained in detail below in conjunction with the accompanying drawings.
As shown in figure 1, the cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value comprises the following steps:
S101:Each secondary user's and fusion center carry out perception ambient parameter to ambient parameter in network;Fusion center meter
Calculation average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability, bit average signal-to-noise ratio, a bit error probability,
Report the probability of correct sensing results;
S102:Fusion center determines time window size;Select trust value thresholding;
S103:Seclected time window and trust thresholding;Secondary user's report frequency spectrum perception result to fusion center;Calculate every
The trust value of individual secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding;Judge to participate in cooperation
The difference of the quantity of the element of the secondary user's set of frequency spectrum perception and the number of elements of honest user set;Fusion center is carried out
Frequency spectrum perception result judgement, obtain final court verdict.
The application principle of the present invention is further described below in conjunction with the accompanying drawings.
As shown in Fig. 2 formula cognition wireless network centered on the application scenarios of the present invention, time user is in samely in network
Manage in primary user's PU signal cover in position, while honest secondary user's SU and malice secondary user's MSU be present
Collaborative spectrum sensing is carried out, secondary user's perceive frequency range using the method for Energy-aware, in local compared with noise gate
Court verdict is reported into fusion center FC afterwards, occupancy of the fusion center FC according to the court verdict of each reporting of user to channel perception
Situation makes final judgement.
Cooperative frequency spectrum sensing method provided in an embodiment of the present invention based on trust value comprises the following steps:
First, system initialization:
Step 1.1:Perceive ambient parameter:
Each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU transmitting work(
Rate ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary user's SUiWith melting
The distance between conjunction center di, path loss constant κ, path loss index μ, the variance of energy measuring thresholding λ and Gaussian noise
σ2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;
Step 1.2:Fusion center calculates average signal-to-noise ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd:
Based on the parameter having determined, fusion center is respectively to the secondary user's SU under preferable CCCHiReceive
To the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween path loss hPU
With detection probability PdCalculated, computational methods are as follows:
Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions, other
Meaning of parameters is identical with 1.1;
Step 1.3:Fusion center calculates path loss hi, bit average signal-to-noise ratioWith a bit error probability Pe,i:
By 1.1 and 1.2 parameters determined, fusion center is respectively to fusion center and secondary under non-ideal CCCH
User SUiBetween path loss hi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit-errors
Probability Pe,iCalculated, computational methods are as follows:
Step 1.4:Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i:
By parameter that is given and having calculated, fusion center is respectively in the secondary user's under preferable CCCH
Report correct perception probability pHCorrect perception probability P is reported with the secondary user's under non-ideal CCCHH,iEstimated,
Method of estimation is as follows:
pH=PBPd+PI(1-Pf);
Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not being authorized
The probability of band transmissions signal, i.e. PI=1-PB;
2nd, trust value thresholding is selected
Step 2.1:Determine time window size:
Fusion center determines to calculate the time window T of secondary user's trust valuew, its determination method is as follows:
Step 2.2:Select trust value thresholding:
Fusion center is respectively each secondary user's SUi(i=1,2 ..., N), select trust value thresholding ηi, its system of selection
It is as follows:
Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
3rd, collaborative spectrum sensing and malicious attacker detect
Step 3.1:Seclected time window TwWith trust thresholding ηi, initialize honest user's set
Fusion center in two, selection trust value thresholding step by obtaining time window TwWith trust thresholding ηiValue, and just
The honest user's set of beginningizationRepresent the secondary user's set of participation collaborative spectrum sensing;
Step 3.2:Secondary user's report frequency spectrum perception result to fusion center:
Secondary user's are in each time window TwObtain perceiving the data of frequency range during beginning by Energy-aware method, and lead to
The carry out hard decision compared with energy threshold λ is crossed the perception data of itself, obtains judgement " 0 ", " 1 " result of itself, and report
Fusion center, " 0 " represent that perception frequency range is idle, and " 1 " represents that perceive frequency range just uses in authorized user;
Step 3.3:Calculate each secondary user's SUiTrust value ri:
In each time window TwAt the end of, for secondary user'sFusion center calculates its trust value ri, its
Computational methods are as follows:
Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result and fusion center conclusive judgement
Consistent number.
Step 3.4:To each secondary user's SUiTrust value riJudged:
Fusion center is by each secondary user's SUiTrust value riWith trusting thresholding ηiIt is compared, if ri< ηi, then perceive
User SUiFor malicious attacker, and update honest user's set"/" represents that user will be perceived
SUiGather from honest userMiddle rejecting;
Step:3.5 judge to participate in the secondary user's set of collaborative spectrum sensingElement quantityUsed with honesty
Gather at familyNumber of elementsDifference;
If fusion center judgesSet up, then go to 3.6, otherwise network operator terminates the network operation,
And each cognitive nodes are investigated, wherein Δ represents difference threshold;
Step:3.6 fusion centers carry out frequency spectrum perception result judgement, obtain final court verdict S:
Fusion center is in next time window TwAccording to the sensing results that secondary user's report and the credit value of the user
Data fusion is carried out with most methods of weighting, obtains final result S, and returns to 3.1 and carries out next round collaborative spectrum sensing,
Final result S computational methods are as follows:
Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, are merged
The court verdict at center is " 1 ", i.e., channel perception takes;Otherwise court verdict is " 0 ", and channel perception is idle.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
All any modification, equivalent and improvement made within refreshing and principle etc., should be included in the scope of the protection.
Claims (10)
- A kind of 1. cooperative frequency spectrum sensing method based on trust value, it is characterised in that the collaboration frequency spectrum sense based on trust value Perception method includes:After network startup, each secondary user's and fusion center perceive ambient parameter in network, to each ginseng needed for system Number is initialized;Fusion center, which calculates average signal-to-noise ratio, false-alarm probability, path loss parameter, detection probability, bit, averagely to be believed Make an uproar ratio, a bit error probability, report the probability of correct sensing results;Fusion center determines time window size, selection letter Appoint value thresholding;Fusion center seclected time window and trust thresholding;Secondary user's report frequency spectrum perception result to fusion center;Meter Calculate the trust value of each secondary user's;The trust value of each secondary user's is judged compared with trusting thresholding;Judge to participate in The difference of the quantity of the element of the secondary user's set of collaborative spectrum sensing and the number of elements of honest user set;Fusion center Frequency spectrum perception result judgement is carried out, obtains final court verdict.
- 2. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 1, it is characterised in that described to be based on trust value Cooperative frequency spectrum sensing method comprise the following steps:Step 1, each secondary user's and fusion center perceive to following ambient parameter in network:Authorized master user PU hair Penetrate power ρPU, secondary user's SUiTransmission power ρi, primary user PU and secondary user's SUiThe distance between dp, secondary user's SUi The distance between fusion center di, path loss constant κ, path loss index μ, energy measuring thresholding λ and Gaussian noise Variances sigma2;Wherein i=1,2 ..., N, N represent to participate in the secondary user's sum of collaborative spectrum sensing;Fusion center calculates average letter Make an uproar ratioFalse-alarm probability Pf, path loss hPUWith detection probability Pd:Fusion center is respectively to time under preferable CCCH Level user SUiReceive the average signal-to-noise ratio of primary user's PU signalsFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween Path loss hPUWith detection probability PdCalculated;Fusion center calculates path loss hi, bit average signal-to-noise ratioWith one Bit error probability Pe,i:Fusion center is respectively to fusion center under non-ideal CCCH and secondary user's SUiBetween road H is lost in footpathi, bit average signal-to-noise ratio between fusion center and secondary user's SUWith a bit error probability Pe,iCounted Calculate;Fusion center is estimated to report the Probability p of correct sensing resultsHAnd PH,i:Fusion center is respectively under preferable CCCH Secondary user's report correct perception probability pHCorrect perception probability is reported with the secondary user's under non-ideal CCCH PH,iEstimated;Step 2, fusion center determine to calculate the time window T of secondary user's trust valuew;Fusion center is respectively each secondary use Family SUi(i=1,2 ..., N), select trust value thresholding ηi;Step 3, seclected time window TwWith trust thresholding ηi, initialize honest user's setSecondary user's are in each time Window TwObtain perceiving the data of frequency range during beginning by Energy-aware method, and by by the perception data of itself and energy door Limit λ compares carry out hard decision, obtains judgement " 0 ", " 1 " result of itself, and reports fusion center, and " 0 " represents to perceive frequency range sky Spare time, " 1 " represent that perceive frequency range just uses in authorized user;In each time window TwAt the end of, for secondary user'sFusion center calculates its trust value ri;Fusion center is by each secondary user's SUiTrust value riWith trusting thresholding ηiIt is compared, if ri< ηi, then user SU is perceivediFor malicious attacker, and update honest user's set "/" represents that user SU will be perceivediGather from honest userMiddle rejecting;Judge to participate in collaboration frequency spectrum sense The secondary user's set knownNumber of elementsGather with honest userNumber of elementsDifference:In fusion If the heart judgesSet up, then carry out in next step, otherwise network operator terminates the network operation, and recognizes each Know that node is investigated, wherein Δ represents difference threshold;Fusion center is in next time window TwReported according to secondary user's The credit value of sensing results and the user carry out data fusion with most methods of weighting, obtain final result S.
- 3. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates flat Equal signal to noise ratioFalse-alarm probability Pf, primary user PU and secondary user's SUiBetween path loss hPUWith detection probability PdRefer to:Wherein w represents time-bandwidth product, and Γ () represents gamma function, and Γ () represents incomplete gamma functions.
- 4. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates road H is lost in footpathi, bit average signal-to-noise ratioWith a bit error probability Pe,iRefer to:
- 5. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that in fusion center estimation Report the Probability p of correct sensing resultsHAnd PH,iRefer to:pH=PBPd+PI(1-Pf);Wherein PBWhat is represented is that primary user PU is authorizing the probability of band transmissions signal, PIRepresent that primary user PU is not authorizing frequency range The probability of transmission signal, PI=1-PB;
- 6. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that when fusion center determines Between window TwSize refers to:
- 7. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center selection letter Appoint value thresholding ηiRefer to ηiMeet:Wherein erfc (x) is complementary error function,∈ represents the bit error rate.
- 8. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center calculates every Individual secondary user's SUiTrust value riRefer to:Wherein τiRepresent in time window TwInterior secondary user's SUiReport frequency spectrum perception result consistent with fusion center conclusive judgement Number.
- 9. the cooperative frequency spectrum sensing method based on trust value as claimed in claim 2, it is characterised in that fusion center enters line frequency Compose sensing results to judge, obtain final result S and refer to:Wherein ldiRepresent secondary user's SUiLocal frequency spectrum perception court verdict, ldi∈{0,1};If S < 0, fusion center Court verdict be " 1 ", i.e., channel perception take;Otherwise court verdict is " 0 ", and channel perception is idle.
- A kind of 10. cognition wireless using the cooperative frequency spectrum sensing method based on trust value described in claim 1~9 any one Network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710735383.0A CN107623554B (en) | 2017-08-24 | 2017-08-24 | Cooperation spectrum sensing method based on trust value and cognitive wireless network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710735383.0A CN107623554B (en) | 2017-08-24 | 2017-08-24 | Cooperation spectrum sensing method based on trust value and cognitive wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107623554A true CN107623554A (en) | 2018-01-23 |
CN107623554B CN107623554B (en) | 2021-02-02 |
Family
ID=61088247
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710735383.0A Active CN107623554B (en) | 2017-08-24 | 2017-08-24 | Cooperation spectrum sensing method based on trust value and cognitive wireless network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107623554B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035429A (en) * | 2019-04-09 | 2019-07-19 | 重庆邮电大学 | WiFi and anti-interference minimal redundancy method under ZigBee coexistance model |
CN110337106A (en) * | 2019-07-10 | 2019-10-15 | 广东工业大学 | A kind of cooperative frequency spectrum sensing method, the apparatus and system of anti-SSDF attack |
CN111106888A (en) * | 2019-12-10 | 2020-05-05 | 重庆邮电大学 | Multi-mode correlation based step-by-step spectrum sensing method and storage medium |
CN111770499A (en) * | 2020-06-24 | 2020-10-13 | 电子科技大学 | Distributed spectrum cooperation detection method |
CN113347638A (en) * | 2021-05-14 | 2021-09-03 | 东北大学 | Dynamic cooperative spectrum prediction and sensing method for cognitive industry Internet of things |
CN113472463A (en) * | 2021-06-30 | 2021-10-01 | 中国人民解放军国防科技大学 | Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network |
CN113765607A (en) * | 2021-03-15 | 2021-12-07 | 全球能源互联网研究院有限公司 | Frequency spectrum detection method and device |
CN114189299A (en) * | 2021-11-08 | 2022-03-15 | 西安电子科技大学广州研究院 | Rapid consensus method and system capable of defending against spectrum sensing data forgery attacks |
CN114614923A (en) * | 2022-02-25 | 2022-06-10 | 中国人民解放军陆军工程大学 | Spectrum use order strengthening method and system based on abnormal frequency behavior detection |
CN116132192A (en) * | 2023-02-27 | 2023-05-16 | 无锡学院 | Cognitive internet of things collusion SSDF attack detection method based on FP-growth algorithm |
CN116318478A (en) * | 2023-03-23 | 2023-06-23 | 中山大学 | Energy efficiency-based normalized unmanned aerial vehicle frequency spectrum sensing method and system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413474A (en) * | 2012-01-04 | 2012-04-11 | 西安电子科技大学 | Self-adaption trust management system and method of cognitive radio network |
CN103731834A (en) * | 2014-01-02 | 2014-04-16 | 重庆邮电大学 | Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network |
CN103957062A (en) * | 2014-03-31 | 2014-07-30 | 西安电子科技大学 | Method for evaluating reputation of cognitive users in distributed cognitive radio network |
CN104065430A (en) * | 2014-07-09 | 2014-09-24 | 南通大学 | Method for cooperative spectrum detection based on node recognition |
CN105227253A (en) * | 2015-08-20 | 2016-01-06 | 黑龙江科技大学 | A kind of novel double threshold collaborative spectrum sensing algorithm based on energy measuring |
CN105490761A (en) * | 2015-11-25 | 2016-04-13 | 宁波大学 | A vehicle network cognitive radio adaptive spectrum sensing method |
-
2017
- 2017-08-24 CN CN201710735383.0A patent/CN107623554B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102413474A (en) * | 2012-01-04 | 2012-04-11 | 西安电子科技大学 | Self-adaption trust management system and method of cognitive radio network |
CN103731834A (en) * | 2014-01-02 | 2014-04-16 | 重庆邮电大学 | Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network |
CN103957062A (en) * | 2014-03-31 | 2014-07-30 | 西安电子科技大学 | Method for evaluating reputation of cognitive users in distributed cognitive radio network |
CN104065430A (en) * | 2014-07-09 | 2014-09-24 | 南通大学 | Method for cooperative spectrum detection based on node recognition |
CN105227253A (en) * | 2015-08-20 | 2016-01-06 | 黑龙江科技大学 | A kind of novel double threshold collaborative spectrum sensing algorithm based on energy measuring |
CN105490761A (en) * | 2015-11-25 | 2016-04-13 | 宁波大学 | A vehicle network cognitive radio adaptive spectrum sensing method |
Non-Patent Citations (1)
Title |
---|
李红宁等: "《认知无线网络中收敛感知算法安全性检测》", 《西安电子科技大学学报》 * |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035429A (en) * | 2019-04-09 | 2019-07-19 | 重庆邮电大学 | WiFi and anti-interference minimal redundancy method under ZigBee coexistance model |
CN110035429B (en) * | 2019-04-09 | 2021-11-09 | 重庆邮电大学 | Anti-interference minimum redundancy method in WiFi and ZigBee coexistence mode |
CN110337106A (en) * | 2019-07-10 | 2019-10-15 | 广东工业大学 | A kind of cooperative frequency spectrum sensing method, the apparatus and system of anti-SSDF attack |
CN111106888B (en) * | 2019-12-10 | 2022-03-22 | 重庆邮电大学 | Multi-mode correlation based step-by-step spectrum sensing method and storage medium |
CN111106888A (en) * | 2019-12-10 | 2020-05-05 | 重庆邮电大学 | Multi-mode correlation based step-by-step spectrum sensing method and storage medium |
CN111770499A (en) * | 2020-06-24 | 2020-10-13 | 电子科技大学 | Distributed spectrum cooperation detection method |
CN111770499B (en) * | 2020-06-24 | 2022-04-26 | 电子科技大学 | Distributed spectrum cooperation detection method |
CN113765607B (en) * | 2021-03-15 | 2022-08-30 | 全球能源互联网研究院有限公司 | Frequency spectrum detection method and device |
CN113765607A (en) * | 2021-03-15 | 2021-12-07 | 全球能源互联网研究院有限公司 | Frequency spectrum detection method and device |
CN113347638A (en) * | 2021-05-14 | 2021-09-03 | 东北大学 | Dynamic cooperative spectrum prediction and sensing method for cognitive industry Internet of things |
CN113347638B (en) * | 2021-05-14 | 2024-04-30 | 东北大学 | Cognitive industrial Internet of things dynamic cooperation spectrum prediction and perception method |
CN113472463A (en) * | 2021-06-30 | 2021-10-01 | 中国人民解放军国防科技大学 | Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network |
CN113472463B (en) * | 2021-06-30 | 2023-06-16 | 中国人民解放军国防科技大学 | Detection method for secondary user violating interference constraint behavior in cognitive wireless network |
CN114189299A (en) * | 2021-11-08 | 2022-03-15 | 西安电子科技大学广州研究院 | Rapid consensus method and system capable of defending against spectrum sensing data forgery attacks |
CN114614923A (en) * | 2022-02-25 | 2022-06-10 | 中国人民解放军陆军工程大学 | Spectrum use order strengthening method and system based on abnormal frequency behavior detection |
CN114614923B (en) * | 2022-02-25 | 2023-08-29 | 中国人民解放军陆军工程大学 | Spectrum use order strengthening method and system based on abnormal frequency behavior detection |
CN116132192A (en) * | 2023-02-27 | 2023-05-16 | 无锡学院 | Cognitive internet of things collusion SSDF attack detection method based on FP-growth algorithm |
CN116318478A (en) * | 2023-03-23 | 2023-06-23 | 中山大学 | Energy efficiency-based normalized unmanned aerial vehicle frequency spectrum sensing method and system |
CN116318478B (en) * | 2023-03-23 | 2024-09-06 | 中山大学 | Energy efficiency-based normalized unmanned aerial vehicle frequency spectrum sensing method and system |
Also Published As
Publication number | Publication date |
---|---|
CN107623554B (en) | 2021-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107623554A (en) | A kind of cooperative frequency spectrum sensing method based on trust value, cognition wireless network | |
Spuhler et al. | Detection of reactive jamming in DSSS-based wireless communications | |
CN102724678B (en) | Reputation-based resource allocation method in central-type cognition wireless network | |
CN103117820B (en) | Based on the weighting cooperative spectrum detection method of confidence level | |
CN103929259B (en) | A kind of many bit decision cooperation adaptive spectrum cognitive methods based on degree of belief in cognitive ofdm system | |
CN106603500B (en) | Frequency spectrum perception data detection method in cognition wireless network based on relationship match | |
CN103731834A (en) | Method and device for resisting cooperative type sensing data falsification attack through cognitive wireless network | |
CN103780317A (en) | Double-threshold collaborative frequency spectrum perception method based on trust degree | |
CN103338082A (en) | Double-threshold cooperation frequency spectrum sensing method based on k-rank criteria | |
CN101615926A (en) | Asynchronous cooperation frequency spectrum sensing method in the cognitive radio | |
CN104618908A (en) | Method and device for resisting spectrum sensing data falsification through distributed cognitive radio network | |
CN103841566B (en) | Method for cooperative spectrum sensing based on D-S evidence theory under condition of malicious user attacks in mobile model | |
Wang et al. | Detection of collaborative SSDF attacks using abnormality detection algorithm in cognitive radio networks | |
Zhang et al. | Cooperative spectrum sensing based on artificial neural network for cognitive radio systems | |
CN106850583A (en) | A kind of distributed collaborative frequency spectrum perception attack defense method based on effectiveness | |
CN108924847A (en) | A kind of cognitive radio frequency spectrum prediction technique and equipment based on ANN | |
CN108449151B (en) | Spectrum access method in cognitive radio network based on machine learning | |
CN104079359A (en) | Cooperative spectrum sensing threshold optimization method in cognitive wireless network | |
CN110768935A (en) | SSDF attack resisting method based on evidence theory and fuzzy entropy | |
CN113472463A (en) | Method for detecting interference constraint violation behavior of secondary user in cognitive wireless network | |
CN109150623B (en) | Method for resisting SSDF attack of malicious user based on round robin reputation value | |
Yan et al. | Signal strength based wireless location verification under spatially correlated shadowing | |
CN104394543A (en) | Joint frequency spectrum sensing method based on Adaboost algorithm | |
CN105743594B (en) | Primary user's bogus attack detection method based on cooperation among users in a kind of cognitive radio system | |
CN104618909B (en) | A kind of aviation radio cooperative frequency spectrum sensing method based on credit worthiness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210607 Address after: No.10702, building 1, Qing'an Park, No.9, Gaoxin 2nd Road, high tech Zone, Xi'an City, Shaanxi Province, 710000 Patentee after: Xi'an Lianke Information Technology Co.,Ltd. Address before: 710071 Xi'an Electronic and Science University, 2 Taibai South Road, Shaanxi, Xi'an Patentee before: XIDIAN University |